Objectives for targeting endpoints include, but are not limited to:
Identifying and exploiting vulnerabilities in the system.
Compromising control of the device to execute an attack. For example, executing a DoS attack with the help of botnets.
Using the endpoint as an entry point to an organization, to exploit valuable assets and sensitive information